CVE-2023-45585
- EPSS 0.05%
- Veröffentlicht 14.11.2023 18:15:55
- Zuletzt bearbeitet 21.11.2024 08:27:00
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and be...
CVE-2023-41676
- EPSS 0.25%
- Veröffentlicht 14.11.2023 18:15:52
- Zuletzt bearbeitet 21.11.2024 08:21:28
An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.
CVE-2023-36553
- EPSS 1.83%
- Veröffentlicht 14.11.2023 18:15:48
- Zuletzt bearbeitet 21.11.2024 08:09:55
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 a...
CVE-2023-34992
- EPSS 79.33%
- Veröffentlicht 10.10.2023 17:15:11
- Zuletzt bearbeitet 21.11.2024 08:07:47
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execut...
CVE-2023-36551
- EPSS 0.47%
- Veröffentlicht 13.09.2023 13:15:08
- Zuletzt bearbeitet 21.11.2024 08:09:55
A exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.5 allows attacker to information disclosure via a crafted http request.
CVE-2023-26204
- EPSS 0.2%
- Veröffentlicht 13.06.2023 09:15:16
- Zuletzt bearbeitet 21.11.2024 07:50:54
A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attac...
CVE-2022-43949
- EPSS 0.1%
- Veröffentlicht 13.06.2023 09:15:16
- Zuletzt bearbeitet 21.11.2024 07:27:23
A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.
CVE-2022-42478
- EPSS 0.16%
- Veröffentlicht 13.06.2023 09:15:15
- Zuletzt bearbeitet 21.11.2024 07:25:03
An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints.
CVE-2022-26119
- EPSS 0.07%
- Veröffentlicht 02.11.2022 12:15:50
- Zuletzt bearbeitet 21.11.2024 06:53:28
A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.
CVE-2021-41023
- EPSS 0.05%
- Veröffentlicht 02.11.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:25:17
A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files